Skip to content

Commit 835f4b7

Browse files
Add read-only access to infra
Also drops access from read-only roles to kms:Decrypt. That operation isn't considered a write operation, but grants e.g. access to SSM secret values, which doesn't seem ideal.
1 parent 890cacf commit 835f4b7

File tree

1 file changed

+17
-0
lines changed

1 file changed

+17
-0
lines changed

terragrunt/modules/aws-organization/groups.tf

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,21 @@ resource "aws_ssoadmin_managed_policy_attachment" "read_only_access" {
9292
permission_set_arn = aws_ssoadmin_permission_set.read_only_access.arn
9393
}
9494

95+
resource "aws_ssoadmin_permission_set_inline_policy" "no_kms" {
96+
inline_policy = data.aws_iam_policy_document.no_kms.json
97+
instance_arn = local.instance_arn
98+
permission_set_arn = aws_ssoadmin_permission_set.read_only_access.arn
99+
}
100+
101+
data "aws_iam_policy_document" "no_kms" {
102+
statement {
103+
sid = "DropKMSDecrypt"
104+
effect = "Deny"
105+
actions = ["kms:Decrypt"]
106+
resources = ["*"]
107+
}
108+
}
109+
95110
// Triagebot team read-only access into the legacy account.
96111
resource "aws_ssoadmin_permission_set" "triagebot_access" {
97112
instance_arn = local.instance_arn
@@ -245,6 +260,8 @@ locals {
245260
groups : [
246261
{ group : aws_identitystore_group.infra-admins,
247262
permissions : [aws_ssoadmin_permission_set.read_only_access, aws_ssoadmin_permission_set.administrator_access] },
263+
{ group : aws_identitystore_group.infra,
264+
permissions : [aws_ssoadmin_permission_set.read_only_access] },
248265
]
249266
},
250267
]

0 commit comments

Comments
 (0)